Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    REVIEW

    Research Progress on Economic Forest Water Stress Based on Bibliometrics and Knowledge Graph

    Xin Yin1,#, Shuai Wang1,#, Chunguang Wang1, Haichao Wang2, Zheying Zong1,3,*, Zeyu Ban1

    Phyton-International Journal of Experimental Botany, Vol.93, No.5, pp. 843-858, 2024, DOI:10.32604/phyton.2024.049114 - 28 May 2024

    Abstract This study employed the bibliometric software CiteSpace 6.1.R6 to analyze the correlation between thermal infrared, spectral remote sensing technology, and the estimation of economic forest water stress. It aimed to review the development and current status of this field, as well as to identify future research trends. A search was conducted on the China National Knowledge Infrastructure (CNKI) database using the keyword “water stress” for relevant studies from 2003 to 2023. The visual analysis function of CNKI was used to generate the distribution of annual publication volume, and CiteSpace 6.1.R6 was utilized to create network More >

  • Open Access

    ARTICLE

    Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security

    Rashad Mahmood Saqib1, Adnan Shahid Khan1,*, Yasir Javed2, Shakil Ahmad2, Kashif Nisar3, Irshad A. Abbasi4, Muhammad Reazul Haque5, Azlina Ahmadi Julaihi1

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1633-1647, 2022, DOI:10.32604/iasc.2022.021786 - 09 December 2021

    Abstract This study presents the current state of research on multi-factor authentication. Authentication is one of the important traits in the security domain as it ensures that legitimate users have access to the secure resource. Attacks on authentication occur even before digital access is given, but it becomes quite challenging with remote access to secure resources. With increasing threats to single authentication schemes, 2Factor and later multi-factor authentication approaches came into practice. Several studies have been done in the multi-factor authentication discipline, and most of them proposed the best possible approaches, but there are very limited… More >

Displaying 1-10 on page 1 of 2. Per Page